From here you can browse all malware analysis in the database by hash.

The output is sub-categorized by the first three sets of Octets. To browse to your hash, you can either search for it, or click through the first 3 sets of bytes in the hash of the malware to locate the matching output if it exists.

Browse 41 b0 ad
41b0ad34ff1f07764ff2d36b0c1369a68191407f 41b0ad48926e101fc054ee943f09c541b630048d 41b0ad8156e203044ba483565c1293cbe8025bde 41b0adb4d70f8da7d48a6d6f50621c57b741dd95 41b0ade076ef9ddc9d49af363309905433554160